Showing 1 to 30 of 55

OPERATING SYSTEMS
BY L. Mutanu Mwaura
CH7: DEADLOCKS
Bridge Crossing Example
Traffic only in one direction
Each section of a bridge can be viewed as a resource
If a deadlock occurs, it can be resolved if one car backs
up (preempt resources and rollback

IST3050 Introduction To Information
Security
WK01
Information Security: An
Introduction
BY
Jimmy Macharia, PhD.
Associate Professor of Information Systems
Learning Objectives
Upon completion of this material, you should be
able to:
1. Define information

Lab: Wiping Disks Drives
What you need for this lab:
A Windows 7 Guest VM and Kali Linux Guest VM on VMware Player already installed
A USB thumb drive (preferably small capacity e.g. 1GB)
You will be required to submit screen shots of your work on a word

Lab Exercise on Control Structure
Compound Interest Calculation
A person invests some amount in a saving account yielding some interests.
Assuming that all the interest is left on deposit, calculate and print the amount
of money in the account at the end

TOPIC IV
WRITING STAGE II: PARTS OF AN
ESSAY
Writing process
Good writings dont just happen. It takes
several stages to come up with a good
piece of writing
There are several stages to the Writing
Process and each stage is essential. The
following are the

TITLE PAGE
PRINCIPLES OF MARKETING TERM PAPER
IMPLICATIONS OF MARKET SEGMENTATION IN THE HOTEL
INDUSTRY
AUTHOR: NYAMBOK LINDA VANESSA
INSTITUTION: UNITED STATES INTERNATIONAL UNIVERSITY
DATE: 12/07/2017

WEEK NINE: PERSONS AS MORAL AGENTS
A moral agent is a being that has capacity to sense moral value, to
distinguish between right and wrong and be accountable for their actions.
It is persons who meet these criteria.
Infants, people with mental disability

ARISTOTLES DOCTRINE OF HAPPINESS AND THE HIGHESTGOOD
According to Aristotle all things that exist have a purpose or goal embedded in their nature-all
things move towards perfection i.e. towards realization of their proper goal
In the same way all human pu

IST3050 Introduction To Information
Security
WK02
Why Security is Needed
BY
Jimmy Macharia, PhD.
Associate Professor of Information Systems
Learning Objectives
Upon completion of this material, you should be
able to:
1. Demonstrate that organizations hav

OPERATING SYSTEMS
BY L. Mutanu Mwaura
CH4: THREADS
2
Overview
Up to now, we have assumed 1 process. This is equivalent
to 1 path of execution.
Almost all modern OSs provide some way to get multiple
concurrent ways of execution inside one process. A
thre

OPERATING SYSTEMS
BY L. Mutanu Mwaura
CH2: OPERATING SYSTEM SRUCTURE
Computer System Architecture
Device Controllers
Each device controller is in
charge of a particular
device type
Each device controller
has a local buffer. I/O is
from the device to loc

Chapter 4. Process Scheduling
The previous chapter discussed processes, the operating system abstraction of active program
code. This chapter discusses the process scheduler, the chunk of code that puts those processes to
work.
The process scheduler is th

OPERATING SYSTEMS
BY L. Mutanu Mwaura
CH5: CPU SCHEDULING
2
Overview
The goal of multiprogramming is to have a process running
in the CPU at all times. CPU scheduling determines which
process in the ready queue should be selected.
Several policies exist

WEEK TEN: THEORIES ABOUT THE NATURE OF MORALITY
CULTURAL RELATIVISM
-
It is a theory about the nature of morality
It says that morality, moral standards are relative, that they vary from
culture to culture
That there is no such thing as universal truth ab

Comparison
and
Contrast
What is the Purpose?
To show the
similarities between
at least two things
and/or
To show the
difference between
two things
To inform
To explain
To analyze
To evaluate
Pre-writing
Chart
Price
BMW
Honda
Civic
Mileage
Insurance
Venn D

Recent Documents

AN EXPOSITORY ESSAY
PURPOSE: FOR MEETING CLASS ASSIGNMENT
TO: OMONDI OKETCH
BY: JAMES OYANGE ODHIAMBO
YEAR: SUMMER 2017
My experience in English 1106 class
In my two and a half semesters at United States International University (USIU-Africa),
English 110

IST 3050
Introduction to
Security Systems
Week Two: Introduction to
Information Security
Introduction
Primary mission of information security is
to ensure systems and contents stay the
same
If no threats, could focus on improving
systems, resulting in v

IST 3050 Introduction
to Security Systems
Week Four: Security
Assurance and Secure
Design
Secure-System Design (SSD)
Definition of a system
System design is the process or art
of defining the hardware and software
architecture, components, modules,
inte